Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Control-flow attestation for embedded systems: detect runtime attacks, ensure software integrity. Novel approach combines remote attestation with control-flow monitoring for enhanced security in IoT devices.
Explore functional lattice cryptography, focusing on cyclotomic rings and FHE implementations. Learn about performance improvements and a compiler for homomorphic evaluation.
Explores efficient batched oblivious PRF for private set intersection, presenting novel protocols and discussing security implications and comparisons with existing methods.
Explore advanced techniques for secure multiparty computation, focusing on oblivious transfer and authentication methods to enhance efficiency and security in distributed computing.
Explore a novel framework for prototyping applications using multilinear maps and matrix branching programs, focusing on optimizations, cryptographic techniques, and performance improvements in program obfuscation.
Explore innovative garbling techniques for Boolean and arithmetic circuits, enhancing cryptographic protocols and secure computation methods.
Optimizing secure multiparty computation for internet use, focusing on efficiency improvements in BMR protocol and OT-based methods for honest-minority settings.
Explore alternative implementations of secure real numbers, including golden section numbers and logarithmic floats, with benchmarks for various operations in secure computation outsourcing.
Innovative approach to protect sensitive data during sleep-wake cycles, addressing memory secrets and implementation challenges in computer security systems.
Innovative mobile device security system using acoustic sensing to automatically lock devices when users leave, preventing data theft and unauthorized access.
Explore Chrome's process-based sandboxing, its security implications, and potential vulnerabilities in web browser architecture. Learn about attacks exploiting the fuzzy web/local boundary.
Explore secure development through a competitive contest format, analyzing builder strategies, common vulnerabilities, and resilience in software security.
Explore techniques for detecting entropy loss in pseudo-random number generators, crucial for cryptographic security. Learn analysis procedures and implementation strategies.
Explores WiFi signal-based mobile password inference, discussing attack scenarios, challenges, system design, and data processing methods for enhancing cybersecurity awareness.
Explores security vulnerabilities in ambient audio-based two-factor authentication, demonstrating potential attacks and discussing mitigation strategies for improved cybersecurity.
Get personalized course recommendations, track subjects and courses with reminders, and more.